An Empirical Study of Test Management in Bug Tracking System IJTSRD
Bug-Tracking mechanism is employed only is some of the large software development houses. Most of the others never bothered with bug tracking at all, and instead simply relied on shared lists and email to monitor the status of defects. This procedure is error-prone and tends to cause those bugs judged least significant by developers to […]
JomSecurity Localized Attack of IPS IJTSRD
Internet became a vital part of our life so from a small to big company has set up their own network. Thus, to prevent the companys network security breached and private information might leak out it is important to implement good network security. The current limitation of IPS only relies on the global signature to […]
SCADA for National Critical Infrastructures: Review of the Security Threats, Vulnerabilities and Countermeasures IJTSRD
The Supervisory Control And Data Acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities to citizens such as electricity, natural gas, crude oil and refined petroleum products, waste-water treatment and transportation. This paper looks at SCADA, its architecture and functions to industrial control system (ICS) as well […]
Holistic Security for Internet-of-Things (IoTs) Implementation in Nigeria IJTSRD
The internet of things (IoT) is everywhere. It’s in our homes, cars, offices and most commonly around our wrists. It’s changing the way factories are run, how health care is delivered and how cities operate. With an estimated 5.5 million new “things” connected each day, and an expected 6.4 billion in circulation by the end […]
Secure Web Applications Against Cross Site Scripting (XSS): A Review IJTSRD
Cross Site Scripting (XSS) attacks are most common vulnerability issues in the digital era for the Web applications. These attacks occur, when an attacker uses a web application to send malicious code in the form of client side script. These scripts exploit the vulnerabilities in the code and resulting in a serious consequence like theft […]